Information flow complexity

Assignment Help Software Engineering
Reference no: EM133480

QUESTION 1

There are many of issues affecting cost of software. List and explain the five parts affecting pricing in software.

QUESTION 2

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
}return temp;
}

(a) Sketch a control flow graph for the above function.

(b) Figure out the Cyclomatic complexity based on your control flow graph.

(c) Using two other methods, show that the Cyclomatic complexity acquired in the above question is correct.

(d) List the set of independent trails from the graph.

QUESTION 3:

Think about the following scenario.
Suppose you work for a company that makes dwelling safety and security monitoring devices and controllers. Now your company desires to sell home safety systems. You are requested to plan and build the software part of the system. The obtainable components are:

• controller (with associated monitoring devices) for door and window alarms

• controller (with associated monitoring devices) for motion detectors

• controller (with associated monitoring devices) for panic buttons

• controller (with associated monitoring devices) for fire detector

• controller (with associated devices) for light activator and deactivator

• controller/monitor for key device (to turn system on and off)

• wireless dial-out device with controller

(a) Evidently state your assumption and calculate the Adjusted Function Point.

(b) Calculate approximately the effort (time taken) to build the system. Presume a productivity of 10FPs per staff month.

QUESTION 4

(a) Portray the types of metrics we have in software development.

(b) List four problems that project managers encounter before starting and during the course of expansion phase of a software project

QUESTION 5

void sort( int *a, int n )
{
int i, j, t;
if( n <2 ) return;
for( i=0 ; i <n-1; i++)
{
for( j=i+1 ; j <n ; j++)
{
if( a[i] > a[j])
{
t=a[i];
a[i] =a[j];
a[j]=t;
}
}
}
}

Concerning Halstead's metrics, calculate the following:

(a) volume

(b) difficulty

(c) effort

Note: Ignore function definition

QUESTION 6

A lot of software companies still make use of subjective estimation techniques while replying to Request for Proposals (RFPs). List and illustrate four common estimation models.

QUESTION 7

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
} return temp;
}

(a) Conclude the Information Flow Complexity.

(b) Compute the Weighted IFC.

QUESTION 8

Using the below stated quality requirement as reference, Give details of the Software Quality Metrics Framework.
Quality precondition: "The product will be easy to use".

Reference no: EM133480

Questions Cloud

Sustainable community tourism : Tourism Area Life Cycle, Doxey's Irridex model, Social Exchange Theory, on-traditional rural expansion strategies, environmental management tools, environmental collisions of tourism
Conserving biodiversity : legal framework to guard biodiversity, marine biosphere, Ex-situ conservation, marine biodiversity, conservation of biodiversity, International Conventions
Ecosystem : preserve biodiversity, social, environmental and cost-effective perspective, in-situ conservation, ex- situ conservation, Invasive alien species, conservation education a significant tool for protecting biodiversity, marine biodiversity, Ecosystem Ba..
Energy transition : energy, poverty, agriculture, biodiversity, Energy Management, geothermal energy, use of E10 in petrol vehicles, use nuclear power to meet the electricity demand, sustainable energy
Information flow complexity : Cyclomatic complexity, monitoring devices, wireless dial-out device with controller, Request for Proposals (RFPs), Weighted IFC
Project management for engineering : economic feasibility of the projec, restrictions are the economics of the project based,  technical feasibility for the project
Ip spoofing : honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer
Protocol stack for wap2 : WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..
Network threats : confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

Reviews

Write a Review

 

Software Engineering Questions & Answers

  Development of a small software system

Analysis, design and development of a small software system.

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Frame diagrams

Prepare a frame diagram for the software systems.

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Describe purpose of the keyword super in programs

Describe purpose of the keyword super in programs

  Star life cycle model

interface design proces, Star Life Cycle as a model for interface Design, Nielsen's usability principles, Shneiderman's eight golden rules

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  What is the standard error

If you have five critical errors, two main faults, and five minor errors, what is the standard error

  Define the term software architecture

Define the term software architecture A service is a software component of distinctive functional meaning that typically encapsulates a high-level business concept, and is usually made up of three parts. Describe the three sub-components that m..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd